We explore whether either UDP or TCP offers any level of end-point authentication in this problem. a. Consider a server that accepts a request via UDP and responds via UDP (for example, as done by a DNS server). Where would the server give its answer if a client with IP address X spoofs it with address Y? b. Assume a server receives a SYN with IP source address Y and responds with SYNACK. The server then receives an ACK with IP source address Y and the right . acknowledgment amount. Assuming the server selects a random initial sequence number and there is no "man-in-the-middle," how can the server be confident that the recipient is really at Y (and not at any other address X that spoofs Y)?
We explore whether either UDP or TCP offers any level of end-point
authentication in this problem.
a. Consider a server that accepts a request via UDP and responds via UDP (for example, as done by a DNS server). Where would the server give its answer if a
client with IP address X spoofs it with address Y?
b. Assume a server receives a SYN with IP source address Y and responds with SYNACK. The server then receives an ACK with IP source address Y and the right
. acknowledgment amount.
Assuming the server selects a random initial sequence number and there is no "man-in-the-middle," how can the server be confident that the recipient is really
at Y (and not at any other address X that spoofs Y)?

Trending now
This is a popular solution!
Step by step
Solved in 2 steps









